Alert
From Computing and Software Wiki
(Difference between revisions)
Line 15: | Line 15: | ||
- real time: | - real time: | ||
- | |||
best effort. | best effort. | ||
- | |||
Data from the network layer. | Data from the network layer. | ||
- | |||
Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections. | Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections. | ||
- | |||
- run time: | - run time: |
Revision as of 17:31, 22 March 2008
Alternation(1):
- warning at least
- or some action taken against the IP that is attacking you.
Alternation(2)
- real time: best effort. Data from the network layer. Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections.
- run time: